Resubmissions

30-05-2024 23:55

240530-3yt9ksga57 10

30-05-2024 23:53

240530-3xms4sga24 10

General

  • Target

    testingrat.exe

  • Size

    45KB

  • Sample

    240530-3yt9ksga57

  • MD5

    7bf7d5fb2ed513c687cd676fe53f5ee9

  • SHA1

    e9251ef1dd3ebe4f17acf0b3552e22751009c8c1

  • SHA256

    afe1cd83d722daa13601c0de896cec93dbae4f9ce4ad78ca3b845060101f0101

  • SHA512

    4c189aee06185359827432b021e8850b1bfbc78da932c4b259b665de7a1b293e0ee281627750bcce7e4fb2ccd8b2b8c0f89a7d68b77e27e7e52832a887f0f447

  • SSDEEP

    768:ldhO/poiiUcjlJInVqH9Xqk5nWEZ5SbTDamWI7CPW5K:7w+jjgn8H9XqcnW85SbTvWIi

Score
10/10

Malware Config

Extracted

Family

xenorat

C2

related-directed.gl.at.ply.gg

Mutex

TestingRat

Attributes
  • install_path

    appdata

  • port

    3403

  • startup_name

    Console

Targets

    • Target

      testingrat.exe

    • Size

      45KB

    • MD5

      7bf7d5fb2ed513c687cd676fe53f5ee9

    • SHA1

      e9251ef1dd3ebe4f17acf0b3552e22751009c8c1

    • SHA256

      afe1cd83d722daa13601c0de896cec93dbae4f9ce4ad78ca3b845060101f0101

    • SHA512

      4c189aee06185359827432b021e8850b1bfbc78da932c4b259b665de7a1b293e0ee281627750bcce7e4fb2ccd8b2b8c0f89a7d68b77e27e7e52832a887f0f447

    • SSDEEP

      768:ldhO/poiiUcjlJInVqH9Xqk5nWEZ5SbTDamWI7CPW5K:7w+jjgn8H9XqcnW85SbTvWIi

    Score
    10/10
    • XenorRat

      XenorRat is a remote access trojan written in C#.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks